Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Nutanix > NCP-MCI > NCP-MCI-7.5

NCP-MCI-7.5 Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) 7.5 Question and Answers

Question # 4

During an LCM upgrade, the pre-check test_ahv_entering_mm_pinned_vms pre-check fails on an AHV host. The administrator reviews the listed VMs and finds that:

    One VM is configured as an Agent VM

    Two VMs are running Windows Defender Credential Guard

    One VM has a vGPU-enabled

Based on the behavior of this pre-check, which action is required to allow the host to enter maintenance mode and proceed with the LCM upgrade?

A.

Enable DRS in the cluster to allow the VMs running Windows Defender Credential Guard to migrate.

B.

Update the VM-VM anti-affinity rules so that the Agent VM can migrate to a different host in the cluster.

C.

Manually migrate the Agent VM and the vGPU enabled VM to a different node in the cluster.

D.

Power off Agent VM, Credential Guard VMs, and pinned vGPU-enabled VM and restart the upgrade.

Full Access
Question # 5

An administrator has noticed that a cluster consists of four Full-NVMe nodes. Which expansion path is supported?

A.

Two Mixed SSD + NVMe nodes with 60 TiB each

B.

One All NVMe node with 96 TiB RAW Capacity

C.

Two Mixed NVMe + HDD nodes with 60 TiB each

D.

One All SSD node with 96 TiB RAW Capacity

Full Access
Question # 6

An administrator is tasked with using Nutanix Move to migrate a VM from Hyper-V to Nutanix AHV. What must be deployed on the Hyper-V host to facilitate migration?

A.

Nutanix Move

B.

Nutanix VirtIO drivers

C.

Nutanix Guest Tools

D.

Nutanix Move Agent

Full Access
Question # 7

An administrator wants to run a workload at site A, but replicate it to two clusters with different RPOs. Which replication option fits the needs?

A.

Many-to-One

B.

Two-Way-Mirroring

C.

Many-to-Many

D.

One-to-Many

Full Access
Question # 8

An administrator attempts to provision a VM using remote storage, but the target container does not appear in the dropdown list. What is the most likely explanation?

A.

The storage container does not have a reservation.

B.

The Storage Container Type is not set as Shared.

C.

The Container Name contains a hyphen(-).

D.

The Container Name Length is 70 characters.

Full Access
Question # 9

A Windows VM will be cloned repeatedly and each clone needs OS-level customization during deployment.

What is the most efficient method to accomplish this task?

A.

Create template for each deployment

B.

Create a VM from snapshot

C.

Guest customization profile

D.

Clone and manually configure

Full Access
Question # 10

The administrator observed the following NCC check in a cluster running VDI workloads:

ec_enablement_check:

Node XX.XX.XX.XX:

INFO: Consider enabling erasure coding on container SelfServiceContainer to get 26% space savings.

INFO: Consider enabling erasure coding on container default-container203943 to get 22% space savings.

What is the best course of action?

A.

Re-run the NCC check to ensure the recommendation is not intermittent.

B.

Enable erasure coding on both storage containers identified by this NCC check.

C.

Ignore the recommendation because this cluster does not have write once, ready many workloads.

D.

Enable erasure coding on the SelfServiceContainer and leave it disabled on the default-container.

Full Access
Question # 11

An administrator has been asked to deploy a single-node Prism Central VM, with the possibility to scale out to increase its capacity. What is the minimum supported Prism Central size?

A.

Small

B.

X-Small

C.

Large

D.

X-Large

Full Access
Question # 12

An administrator needs to protect a set of workloads across three sites (Site A, Site B, Site C) managed by different Prism Central instances. Which is the most efficient way to protect such VMs?

A.

Create a single protection policy from Site A and clone it to Site B and Site C.

B.

Create two protection policies, one from site A to B and one from site A to C.

C.

Create three different protection policies, one per Prism Central.

D.

Create a single protection policy for all three sites from the source cluster.

Full Access
Question # 13

An administrator wants to define a set of conditions and approvers that must be satisfied before a deployment can proceed.

Which component must be enabled?

A.

Policy Engine

B.

Nutanix Central

C.

Marketplace

D.

Power Monitor

Full Access
Question # 14

A VM is protected by a protection policy and the volume group is configured with CHAP authentication. An administrator rotates the VM’s password as part of the monthly routine. What action must the administrator perform to ensure the password is retained in the event of a failover?

A.

Update the associated recovery plan.

B.

Set the password as part of startup policy.

C.

Update the associated protection policy.

D.

Set the password in the VG recovery points.

Full Access
Question # 15

An administrator wants to adjust how often the platform checks for security drift without modifying controls that run at fixed intervals.

Which setting should the administrator modify?

A.

The AIDE schedule

B.

The SCMA schedule

C.

The list of security entities inspected by SCMA

D.

The SCMA baseline enforcement behavior

Full Access
Question # 16

An administrator detects suspicious outbound connections from a single VM that hosts a web tier component.

The incident response requirement is to immediately quarantine the VM so it cannot communicate with any other workload, but still allow connectivity from a designated forensic tooling group so investigators can collect evidence.

The organization uses categories for policy scope and wants a change that can be applied quickly during an incident without redesigning existing policies.

Which action best meets the requirement?

A.

Assign the VM to the built-in Quarantine category with the Forensic value so quarantine behavior blocks traffic except to and from forensic tools.

B.

Assign the VM to the built-in Quarantine category with the Strict value and separately create a shared service policy to allow forensic access.

C.

Create an application policy that only allows outbound traffic to forensic tools, leaving inbound traffic as allow all for faster investigation.

D.

Create an isolation environment policy between the VM and all other categories to block traffic and manually add exceptions for forensic tools.

Full Access
Question # 17

An administrator is creating a settings profile in Prism Central to standardize NTP configuration across multiple clusters. The organization ' s security policy requires that all NTP communication must be authenticated.

The administrator adds an NTP server to the profile, but does not see the Key ID and Key Hex fields.

What is the most likely cause?

A.

Authenticated NTP is only supported when Microservices Infrastructure is disabled on Prism Central.

B.

NTP server must be added through Prism Element before it can be authenticated in Prism Central.

C.

Authentication Type needs to be changed to SHA256, SHA384, or SHA512.

D.

Authenticated NTP requires the cluster to run AOS 7.0 or later.

Full Access
Question # 18

How many storage pools and storage containers are created during cluster creation?

A.

Two pools, two containers

B.

Two pools, three containers

C.

One pool, three containers

D.

One pool, two containers

Full Access
Question # 19

Refer to Exhibit:

After logging into Prism Central, an administrator observes that there are a large number of constrained VMs.

What does this indicate about those VMs?

A.

They are inactive and in a zombie state.

B.

They are lacking in sufficient resources.

C.

They are over-sized and wasting memory.

D.

They are consuming too much CPU.

Full Access
Question # 20

A company has purchased Nutanix hardware for multiple remote branch offices. The IT team at headquarters needs to image and deploy all clusters remotely from a central location.

An administrator deploys Foundation Central from the Prism Central Marketplace.

What capability does Foundation Central provide in this scenario?

A.

Automated backup and recovery of cluster configurations across all sites

B.

Ability to remotely upgrade AOS and AHV on existing clusters

C.

Ability to register all remote clusters to Prism Central automatically after deployment

D.

Single pane of glass to create remote clusters without individual node configuration

Full Access
Question # 21

An administrator added an SSH public key and verified connectivity to CVMs and AHV hosts. What is the recommended next step to reduce interactive access risk?

A.

Enable core dumps on AHV hosts for post-incident analysis.

B.

Disable password authentication for all CVMs and AHV hosts.

C.

Enable a login banner on Prism Central to acknowledge access terms.

D.

Increase the number of concurrent Prism Central UI sessions.

Full Access
Question # 22

Refer to Exhibit:

An administrator has been tasked with enabling LACP on an AHV cluster. In the exhibit, which option is the best to select for Bond Type when completing the task?

A.

Active-Backup

B.

No Uplink Bond

C.

Active-Active

D.

Active-Active with MAC Pinning

Full Access
Question # 23

An administrator supports multiple AHV clusters under Prism Central and uses Intelligent Operations playbooks for remediation.

The organization recently standardized alert policies, but the alert policy names and IDs change between environments due to automated deployments and periodic updates.

The requirement is to trigger a remediation playbook for any alert that matches a defined performance pattern (for example, impact type and severity plus a keyword pattern), regardless of which specific alert policy generated it, while avoiding unrelated non-performance alerts.

Which playbook trigger best meets the requirement?

A.

Alerts Matching Criteria trigger - configured with the required alert filters so the playbook triggers for any alert meeting the criteria.

B.

Webhook trigger - configured so an external system calls the playbook endpoint only when performance incidents are detected.

C.

Alert trigger - configured to a single alert policy so the playbook triggers only when that specific policy generates an alert.

D.

Event trigger - configured for a single event type so the playbook triggers when that event type is generated for the selected entities.

Full Access
Question # 24

An administrator needs to migrate an existing VM from a 3-tier ESXi environment to Nutanix AHV.

What should be used to minimize downtime during the migration?

A.

Nutanix CCLM

B.

Nutanix Move Agent

C.

Backup and restore the VM

D.

Nutanix Move

Full Access
Question # 25

What is the RPO time, in hours, for Prism Central backups?

A.

24

B.

36

C.

48

D.

72

Full Access
Question # 26

An administrator is tasked with creating a Disaster Recovery plan between two clusters within Prism Central local AZ. To ensure a failover operation is successful, the administrator also needs the ability to test recovery in both directions.

What are the recommended networks required between the two clusters for successfully testing the recovery?

A.

Two Production Networks and One Test Network

B.

One Production Network and One Test Network

C.

Two Production Networks and Two Test Networks

D.

One Production Network and Two Test Networks

Full Access
Question # 27

After scaling out Prism Central to improve resiliency, which additional configuration should an administrator complete?

A.

Deploy the Witness service in a separate failure domain.

B.

Configure a Protection Domain to include all Prism Central VMs.

C.

Enable High Availability Reservations for Prism Element cluster.

D.

Set up VM-VM anti-affinity rules between Prism Central VMs.

Full Access
Question # 28

An administrator needs to enable software data-at-rest encryption on a 2-node ROBO cluster. The organization requires that encryption keys are stored on-premises outside of the cluster. Which KMS type should the administrator configure?

A.

Native KMS (local)

B.

Native KMS (remote)

C.

Cloud KMS

D.

External KMS

Full Access
Question # 29

An administrator has a large group of VMs for the marketing team that all have the same RPO requirements of a snapshot every hour. A Protection Policy already exists with an hourly snapshot schedule. What is the easiest way to add this group of VMs to the Protection Policy?

A.

Assign a category to marketing VMs, then add the category to the Protection Policy.

B.

Edit the Protection Policy and add each individual VM.

C.

Create a template for the marketing VMs and add the template to the Protection Policy.

D.

Add each VM to the Protection Policy from the VM page.

Full Access
Question # 30

An administrator needs an account for automation that can be granted granular permissions and being authenticated without an interactive user password.

Which statement best describes how a Prism Central service account authenticates?

A.

Using the cluster admin password and inherits full admin privileges

B.

Using an external KMS key and is limited to encryption operations

C.

Using a CA-signed SSL certificate imported into the Prism Central

D.

Using a shared secret key managed through IAM and can be assigned RBAC roles

Full Access
Question # 31

A corporate security policy mandates strict protection against boot-level rootkits and requires the isolation of NTLM password hashes from the running operating system to prevent " pass-the-hash " attacks.

During the initial testing phase, the administrator deploys a test VM using the standard AHV creation workflow. While configuring the guest operating system, administrator attempts to enable Windows Defender Credential Guard via Group Policy. However, the feature fails to start, and the system logs indicate that the underlying virtualization platform does not meet the necessary hardware security requirements.

Which specific configuration change must the administrator apply to the VM to satisfy the security policy requirements?

A.

Enable UEFI firmware, configure the disk controller to use the IDE bus, and add a vTPM device.

B.

Enable Generation 2 firmware, check the VBS flag, and add a vTPM device.

C.

Enable Legacy BIOS firmware, check the Secure Boot option, and add a vTPM device.

D.

Enable UEFI firmware, check the Secure Boot option, and add a Virtual Trusted Platform Module (vTPM) device.

Full Access
Question # 32

An administrator ran NCC checks and noticed the following failure:

Node x.x.x.x: FAIL: No NTP servers are configured in the cluster configuration Refer to KB 4519 ...

What is the minimum number of NTP servers that should be configured to be considered a good configuration that will ensure a high degree of accuracy?

A.

1

B.

3

C.

5

D.

7

Full Access
Question # 33

Which storage-optimization method is recommended for full clone VDI workloads?

A.

Thin Provisioning

B.

Capacity deduplication

C.

Post-process map reduce

D.

Erasure Coding

Full Access